CVE-2024-43240

9.4 CRITICAL

📋 TL;DR

This vulnerability in Ultimate Membership Pro WordPress plugin allows unauthenticated attackers to escalate privileges, potentially gaining administrative access. It affects all versions up to 12.6 of the plugin. WordPress sites using this plugin are at risk.

💻 Affected Systems

Products:
  • WordPress Ultimate Membership Pro plugin
Versions: All versions up to and including 12.6
Operating Systems: Any OS running WordPress
Default Config Vulnerable: ⚠️ Yes
Notes: Affects all WordPress installations with vulnerable plugin versions installed and activated.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Attackers gain full administrative control over WordPress site, allowing them to modify content, install malicious plugins/themes, steal data, or take over the entire site.

🟠

Likely Case

Attackers create administrator accounts or elevate existing low-privilege accounts to gain persistent access for further malicious activities.

🟢

If Mitigated

With proper network segmentation and monitoring, impact is limited to the affected WordPress instance, but site compromise still occurs.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public exploit details available on Patchstack; unauthenticated nature makes this easily exploitable.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 12.7 or later

Vendor Advisory: https://patchstack.com/database/vulnerability/indeed-membership-pro/wordpress-indeed-ultimate-membership-pro-plugin-12-6-unauthenticated-privilege-escalation-vulnerability?_s_id=cve

Restart Required: No

Instructions:

1. Log into WordPress admin panel. 2. Navigate to Plugins → Installed Plugins. 3. Find Ultimate Membership Pro. 4. Click 'Update Now' if update available. 5. If no update available, deactivate and remove plugin immediately.

🔧 Temporary Workarounds

Disable plugin

all

Deactivate Ultimate Membership Pro plugin to prevent exploitation

wp plugin deactivate indeed-membership-pro

Restrict access

all

Block access to plugin files via web server configuration

# In .htaccess for Apache: 
<Files "ultimate-membership-pro*">
Order Allow,Deny
Deny from all
</Files>
# In nginx config:
location ~ /wp-content/plugins/indeed-membership-pro/ {
    deny all;
}

🧯 If You Can't Patch

  • Immediately deactivate and remove the Ultimate Membership Pro plugin from all WordPress installations
  • Implement strict network segmentation to isolate WordPress instances and monitor for suspicious privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check WordPress admin panel → Plugins → Installed Plugins for Ultimate Membership Pro version 12.6 or earlier

Check Version:

wp plugin get indeed-membership-pro --field=version

Verify Fix Applied:

Verify plugin version is 12.7 or later, or confirm plugin is completely removed

📡 Detection & Monitoring

Log Indicators:

  • Unusual user role changes in WordPress user logs
  • Multiple failed login attempts followed by successful admin login from new IP
  • Plugin file modification timestamps for Ultimate Membership Pro

Network Indicators:

  • HTTP POST requests to Ultimate Membership Pro endpoints with privilege escalation parameters
  • Unusual traffic patterns to /wp-admin/admin-ajax.php

SIEM Query:

source="wordpress" AND (event="user_role_changed" OR event="plugin_updated") AND plugin="indeed-membership-pro"

🔗 References

📤 Share & Export